Cybersecurity Roles, Processes & Operating System Security
- 4.6
Approx. 15 hours to complete
Course Summary
This course provides an overview of cybersecurity roles, processes, and operating system security. Students will learn about various security threats and vulnerabilities, as well as techniques for protecting systems and networks.Key Learning Points
- Learn about the roles and responsibilities of cybersecurity professionals
- Understand the processes and procedures involved in securing systems and networks
- Explore the various threats and vulnerabilities that can compromise security
Related Topics for further study
- Cybersecurity
- Operating system security
- Security threats and vulnerabilities
- Network security
- Information security
Learning Outcomes
- Understand the importance of cybersecurity in protecting systems and networks
- Identify potential security threats and vulnerabilities
- Learn techniques for securing operating systems and networks
Prerequisites or good to have knowledge before taking this course
- Basic knowledge of computer systems and networks
- Familiarity with common cybersecurity terminology
Course Difficulty Level
IntermediateCourse Format
- Self-paced
- Online
- Video lectures
- Quizzes and assignments
Similar Courses
- Introduction to Cybersecurity Tools & Cyber Attacks
- Cybersecurity Fundamentals
Related Education Paths
- Certified Information Systems Security Professional (CISSP)
- Certified Ethical Hacker (CEH)
- CompTIA Security+
Notable People in This Field
- Bruce Schneier
- Eva Galperin
Related Books
Description
This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will learn:
Outline
- People Process & Technology
- Welcome to People, Process and Operating System Fundamentals for Cybersecurity
- Overview of People, Process and Technologies
- What is IT Security?
- Frameworks and their purpose
- Roles in Security
- Introduction to Process
- Business Process Management Overview
- Information Technology Infrastructure Library (ITIL) Overview
- Key ITIL Processes
- Earn an IBM digital badge
- Your Subject Matter Experts
- ITIL framework
- What is IT Service Management?
- Welcome to People, Process and Operating System Fundamentals for Cybersecurity
- Frameworks, Policies and Roles
- Business Process Management and IT Infrastructure Library Basics
- People, Process and Technology
- Examples & Principles of the CIA Triad
- Introduction to the CIA Triad module
- Who are Alice, Bob and Trudy?
- Confidentiality, Integrity and Availability
- Authenticity and Accountability
- Priscilla Mariel Guzman Angulo - What's important for my job.
- Threat Horizon 2019: Disruption. Distortion. Deterioration
- Further discussion of confidentiality, integrity and availability
- Principles of the CIA Triad
- Authentication and Access Control
- Introduction to Authentication and Access Control
- Identification and AAA
- Access Control Methods
- Access Control - Physical and Logical
- Open Web Application Security Project (OWASP)
- OWASP Top 10 Project
- What is AAA?
- Access Control
- Authentication and Access control
- Windows Operating System Security Basics
- Welcome to operating system fundamentals
- User and Kernel Mode
- File Systems
- Directory Structure
- Shortcuts and Commands
- Additional Shortcuts
- User and Kernel Modes
- File Systems and Directory Structure
- Shortcuts and Commands
- Windows Operating System Security Basics
- Linux Operating System Security Basics
- Key Components
- File Systems
- Basic Commands
- Permissions and Owners
- Pentestmonkey research
- Key Components
- File systems
- Linux Basic Commands
- Linux Operating System security basics
- macOS Security Basics
- macOS Auditing
- macOS Security Settings
- macOS Recovery
- macOS Developer resources
- macOS Resources Knowledge Check
- Overview of Virtualization
- Virtualization module introduction
- An Overview of Virtualization
- Virtualization to Cloud
- What is Cloud Computing?
- Cloud Benefits, Security and Governance
- Wrap up
- SANS Institute research exercise
- Differences between virtualization and cloud - RedHat
- Virtualization Basics and Cloud Computing
- Virtualization Basics
Summary of User Reviews
Discover the roles, processes and operating system security aspects of cybersecurity with this comprehensive course. Users have praised the course for its practical and hands-on approach to learning cybersecurity.Key Aspect Users Liked About This Course
Practical and hands-on approach to learning cybersecurityPros from User Reviews
- Comprehensive coverage of cybersecurity topics
- Real-world examples and scenarios
- Engaging and knowledgeable instructors
- Interactive and challenging assignments
- Great preparation for cybersecurity certification exams
Cons from User Reviews
- Some technical concepts may be overwhelming for beginners
- Limited opportunities for peer-to-peer interaction
- No certificate of completion for free version of the course
- Occasional technical issues with the Coursera platform
- Some users found the course to be too long and time-consuming